CAP Security and Data Privacy
Security, data protection and data privacy are critical aspects of modern application development, with significant legal and ethical implications.
The guides in this section are for developers, operators, administrators, and security professionals who need to understand how to develop, deploy and operate secure and compliant CAP applications.
Data Protection vs. Data Privacy:
| Feature | Data Privacy | Data Protection |
|---|---|---|
| Focus | Who has access and how it is used. | Protect against unauthorized access. |
| Nature | A legal concept / human rights. | A suite of security measures. |
| Goals | Ensures user consent and lawful data handling. | Ensures data availability, integrity, and confidentiality. |
- Concepts & Architecture
- This section provides an overview of the security concepts and architecture of CAP applications on different platforms.
- Authentication
- This guide explains how to authenticate CAP services.
- Authorization
- This guide explains how to restrict access to data by adding respective declarations to CDS models, which are then enforced by CAP's generic service providers.
- Data Privacy
- This guide discusses how CAP helps applications to comply with data privacy regulations imposed by various laws and standards.
- Product Security
- CAP provides several features to ensure data protection that meet industry standards and regulatory requirements.